How to Stop All Impostor Threats Coming Into, and Going Out of Your Organization

The cost of Impostor email has risen to $5.1B. Business email compromise (BEC) is impacting employees, business partners and customers of organizations around the world.

Proofpoint Email Fraud Defense (EFD) extends the security already offered by Email Protection to block criminals that spoof your trusted domains to trick victims, both inside and outside of your organization, into sending money and other sensitive information to the attacker.

Join us for a live webinar on Tuesday, June 6th at 10am PST where you will learn:
• Latest impostor email trends including BEC and consumer phishing
• How to extend your current protection to stop all impostor threats
• Upcoming product integration with Email Protection to secure your entire email ecosystem

. CobInt is a fairly new malware, discovered in early 2018, and seems to only be doing reconnaissance for now. It is a three stage malware with the ability to download additional modules when it's ready to strike. Like the other malwares in this series, CobInt uses clever techniques to disguise and hide itself from security researchers. CobInt is spread by a threat actor sending an email to a victim with a Microsoft Word document containing macros. If the macro is enabled, CobInt is downloaded.

tRAT is a new Remote Access Trojan (RAT) that was first discovered back in September. The first campaigns included fake Norton Security and TripAdvisor brands as lures to get victim's to open the included Microsoft Word document, enabling macros.

On October 11, 2018, Proofpoint discovered another tRAT campaign, but this time by threat actor TA505.

AdvisorsBot, is part of a group of recently discovered downloader malwares. AdvisorsBot is targeting hotels, restaurants, and telecommunications companies and is notable because it is currently only collecting system information, can download other modules/payloads, connects back to command and control servers and has many anti-analysis checks built into the code.

What are the key components of a best-in-class solution for phishing simulation and training?

Join us for a live demo of Wombat Security to see for yourself!
Proofpoint recently acquired Wombat Security, a 4-year leader in the Gartner Magic Quadrant for Security Awareness Computer-Based Training, and we're excited to share what makes them the clear leader in the space.

PCAD is fast and easy to deploy, and it secures Office 365 users on any network or device. This allows you to confidently drive your business forward and make the most of Office 365.

Attackers use a variety of methods to compromise Office 365 accounts. And once they do, they can launch attacks inside and outside of your organization. This impacts your reputation and your finance. Our multi-faceted approach helps you detect account compromise and the activities that leverage stolen credentials.

The right credentials in the wrong hands is a dangerous, and very real, threat. Compromised accounts are becoming more problematic for organizations of all sizes as bad actors who use these tactics usually aim to fraud the company, its customers or partners.

Join us for a discussion on the clever methods used to compromise accounts and the headaches that come from it, whether it be phishing or data theft, and the steps your organization can take to help mitigate the threat.

Join this webinar to learn:

• The damage compromised accounts cause, from stolen customer data, to wire fraud
• Why bad actors choose to target people rather than infrastructure
• What you can do to keep your accounts secure

Digital transformation and cloud migration brings many benefits to organisations and one of the main drivers for the rapid adoption is the cloud based email service provided by Office 365.
While leveraging cloud services unarguably enhances productivity, it can still leave your organisation vulnerable to new risks. It is more important than ever for security professionals to ensure full protection against these new risks in real time.

Join us as we discuss the potential threats and solutions you can implement to ensure protection and productivity. What to expect:

The internet has grown to more than 330 million unique domain names and three billion users. Digital transformation means that email, web, social and mobile have become essential channels of engagement for your business but they also increase your exposure to cyber threats, and escalate the level of digital risk.

Your marketing team is connecting with your customers in so many ways—but do you have full visibility of these interactions? How should you safeguard your online brand and maintain GDPR compliance across this digital landscape?

Join our webinar to hear Markus Grueneberg and Jonathan Lee share recommendations and best practices to defend your customers and your business within the digital channels that you operate in.

‘The human factor’—the instincts of curiosity and trust that lead well-meaning people to click, download, install, move funds, and more—is simply more reliable and lucrative than exploits with increasingly short shelf lives.

Join our speakers, Adenike Cosgrove and Davide Canali, as they discuss the findings from our Human Factor 2018 report. We’ll talk through the many ways in which threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that regularly trick even savvy users.

During the webinar, we’ll cover:
-- Trends in volume and type of attack providing useful insights for both defenders and organizations.
-- Ransomware and Email Fraud - how effective have they become and who is being targeted the
most.
-- How bad actors are using cloud services to their benefit
-- Live Q&A with the speakers

Do you know when or how your executives are being targeted? Do you know who the most cyber attacked people in your organisation are? Are your very attacked people (VAPs) the same your very important people (VIPs)?

You need to protect your companies greatest assets– it’s people, and the data that they have access to. You must have visibility into the risky behaviours that indicate that your people may fall for a modern, socially-engineered attack.​The only way to successfully combat today’s advanced attacks is to focus on protecting your people.

Join Proofpoint’s SVP of Cybersecurity, Ryan Kalember during this webinar to learn how to build a people centric cybersecurity strategy that will:

o Prevent cyberattacks by stopping them before they start

o Defend against email and cloud threats

o Respond quickly to threats and limit the damage they could cause

About the presenter:

With over 15-years of experience in the information security industry, Ryan currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for media commentary on breaches and best practices for enterprises as well as consumers. He joined Proofpoint from WatchDox where he served as chief marketing officer and was responsible for successfully building and leading the marketing team through the company’s acquisition by Blackberry. Prior to WatchDox, Ryan was instrumental in running solutions across Hewlett-Packard’s portfolio of security products. He has also held a variety of marketing leadership positions at ArcSight and VeriSign including EMEA regional manager. Ryan received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.

Right now, email is the #1 vector of choice for cyber criminals. To protect your organization, you need technology and information.This event focuses on both.

Join us for a live demo that will explore Proofpoint Email Protection and Target Attack Protection. Learn about:

•Today’s threat landscape and to how to build your defense against spam, malware and non-malware threats
•Approaches for identifying suspicious messages
•The latest in security software to fight against advanced threats

What are the key components of a best-in-class solution for phishing simulation and training?

Join us for a live demo of Wombat Security to see for yourself!

Proofpoint recently acquired Wombat Security, a 4-year leader in the Gartner Magic Quadrant for Security Awareness Computer-Based Training, and we're excited to share what makes them the clear leader in the space.

Organizations today are facing increased attacks using social engineering tactics – In fact, 76% of organizations experienced a phishing attack in 2017. With Proofpoint’s recent acquisition of Wombat Securities organizations can better prevent and stop targeted threats through phishing simulation and training to change end-user behavior.

Join us for this webinar where you will learn:

* About the latest trends and tactics used by threat actors that target your organization
* How to assess your users’ susceptibility to phishing attacks
* To respond to threats through end-user training and reporting

Email Fraud is one of the oldest yet most successful threats against your organization. Proofpoint Email Fraud Defense (EFD) can help you protect your organization and your customers, leveraging the power of email authentication.

Join this product demo to discover how you can protect your organization and people by leveraging the power of EFD.

• Block malicious emails spoofing your domains before they reach your employees and customers
• Monitor all emails (inbound and outbound) from your domains and those of third parties
• Accurately distinguish between legitimate emails and fraudulent emails

In our recent market study, we found that 77% of businesses expect to fall victim to Email Fraud in the next 12 months. Call it business email compromise (BEC) or phishing, the multi-faceted Email Fraud threat is always lurking and continues to grow. However, unlike most cyberthreats these socially engineered attacks seek to exploit people rather than technology.

Join this webinar to learn:
- Findings from our latest Email Fraud study
- Email Fraud trends from 2017 and threats to look out for in 2018
- Helpful tips to protect your people, data and brand against Email Fraud
- Live Q&A with the speakers

In today's ever evolving threat landscape, the attackers are increasingly targeting people rather than technology.

For CISOs and security professionals, the top priority is to strike the perfect balance between technology and employee empowerment. You need to build defences that start with and work for your organisation's most important asset - your people!

Join us and our line up of industry experts at this live panel discussion, part of our Hacking Human Nature Summit to hear how they are building people centric strategies.

Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:
- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.